Sciweavers

826 search results - page 70 / 166
» Medical Requirements for Data Protection
Sort
View
NDSS
1998
IEEE
15 years 2 months ago
Distributed Algorithms for Attack Localization in All-Optical Networks
All-Optical Networks provide ultra-fast data rates, but present a new set of challenges for network security. We present a new algorithm for attack localization in networks. The a...
Ruth Bergman, Muriel Médard, Serena Chan
MIE
2008
160views Healthcare» more  MIE 2008»
14 years 11 months ago
Using Medline Queries to Generate Image Retrieval Tasks for Benchmarking
Medical visual information retrieval has been a very active research area over the past ten years as an increasing amount of images is produced digitally and made available in the ...
Henning Müller, Jayashree Kalpathy-Cramer, Wi...
IPMI
2005
Springer
15 years 10 months ago
A Unified Information-Theoretic Approach to Groupwise Non-rigid Registration and Model Building
The non-rigid registration of a group of images shares a common feature with building a model of a group of images: a dense, consistent correspondence across the group. Image regis...
Carole J. Twining, Timothy F. Cootes, Stephen Mars...
CBMS
2009
IEEE
15 years 4 months ago
HL7 healthcare information management using aspect-oriented programming
Given the heterogeneity of healthcare software systems, data from each system is often incompatible inhibiting interoperability. To enable the sharing and exchange of healthcare i...
Jennifer Munnelly, Siobhán Clarke
ICMI
2009
Springer
132views Biometrics» more  ICMI 2009»
15 years 4 months ago
Activity-aware ECG-based patient authentication for remote health monitoring
Mobile medical sensors promise to provide an efficient, accurate, and economic way to monitor patients’ health outside the hospital. Patient authentication is a necessary secur...
Janani C. Sriram, Minho Shin, Tanzeem Choudhury, D...